Access Manager

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
40
Score:
5

There is no shortage of opinions about the dynamics of hybrid cloud growth and its effect on IT organizations. As such, I found CRN’s 2017 purchasing survey to be a worthwhile snapshot of priorities placed in front of today’s CIO’s and where they are investing the most in. You’ll notice in the survey that 3…

+ read more

Kent Purdy
Sep 14, 2017
8:35 am
Reads:
113
Score:
Unrated

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information…

Koushik Halder
Sep 8, 2017
1:25 pm
Reads:
121
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information that…

Koushik Halder
Aug 31, 2017
9:51 am
Reads:
274
Score:
5

We recently held an essay contest inviting Micro Focus employees and customers to describe why they love using Micro Focus products. This entry was selected as the first-place winner in the Identity and Access Management solution group. The author, Matthew Ruane, received the first-place prize. Take a look at the winning entry…

netiqcoolguys
Aug 17, 2017
10:08 am
Reads:
289
Score:
Unrated

This article explains how you can map your organization’s AD groups to AWS IAM Roles with the help of Attribute Retrieval and Transformation (Virtual Attribute).…

Koushik Halder
Aug 16, 2017
10:05 am
Reads:
311
Score:
5

Ontario Telemedicine Network (OTN) in Canada brings virtual care innovation to the healthcare system so that people can get the care they need when and where they need it most: at home, in their community, or in hospital. OTN needed to be able to quickly, simply, and securely on-board healthcare providers to programs and services…

+ read more

ssalgy
By: ssalgy
Jul 31, 2017
2:59 pm
Reads:
285
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow